Categories: NewsSecurity

Tor Users at Risk of Being Deanonymized by Ultrasound Cross-Device Tracking

People all over the world rely on Tor to maintain a certain level of privacy while browsing the Internet. A new type of attack could make Tor users vulnerable to deanonymization, though. By using ultrasound, it is theoretically possible to track users on the Internet, regardless of them using Tor or any other anonymity tool.

Using Ultrasounds To Deanonymize Tor Is A Threat

Demoed earlier at BlackHat Europe and the Chaos Computer Congress in late 2016, this new ultrasound “exploit” could make life very difficult for Tor users. To be more precise, a technique called ultrasound cross-device tracking is the culprit which makes this all possible. The advertising world has been using this technology for quite some time now, as they aim to track users on the Internet at all times.

As the name suggests, these ultrasound tones are inaudible to the human ear, although most dogs will pick them up without any issues. Despite the user not hearing it, it can be used in multiple ways to determine user behavior. Most of the devices we use these days, including smartphones, can pick up these ultrasounds using dedicated applications.



Once a mobile app hears this ultrasound tone, it can then ping the advertising network with details about the user. In most cases, this will include an IP address, GPS coordinates, a phone number, and even the IMEI code found on one’s SIM card. Although this has only been used for marketing purposes – as far as we know – it is not an unlikely governments and law enforcement agencies will use similar tactics over time.

Related Post

The demo presented at BlackHat Europe 2016 paints a troublesome future for Tor users in this regard. All it takes is a dedicated campaign with this ultrasound service provider and an ultrasonic signal file. Additionally, as it needs to be created on the Tor network that plays this “beacon” in the background every time someone accesses the platform.

If the Tor user has one of these ultrasound-enabled apps on their smartphone, it would then start broadcasting sensitive information to the server. If that were to happen, Tor is no longer anonymous, which renders the entire project moot. Moreover, this attack would not be unique to Tor users alone, as it can unmask anyone using a proxy, VPN, or other anonymity services.

Law enforcement could use the beacon-embedded website tactic to denaonymize Tor users, but that is not their only plausible course of action. Embedded ultrasound in online videos is another option, although it is unclear if YouTube and Vimeo have ways to detect this file. Then again, the same technology is being used by advertisers, so they would need to create a way to distinguish between legitimate and malicious ultrasound files.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

SkyAI’s Explosive 20x Surge Raises Red Flags As On-Chain Data Points To Possible Market Manipulation

The cryptocurrency market is in the crosshairs once again, an explosive price move in SkyAI…

2 hours ago

Bitget Launches OpenAI Pre-IPO Access As Crypto Exchanges Push Into Tokenized Equity Markets

Bitget officially launched pre-IPO access to OpenAI via its IPO Prime platform which deepens their…

17 hours ago

Tether Expands Open-Source Push With New Developer Grants For AI And Payment Infrastructure

Tether's presence in decentralized tech space is growing due to the launch of its developer…

2 days ago

Huma Finance Exploit Hits Legacy Contracts As Platform Maintains Stability And Accelerates Transition To V2 System

While challenges remain, the decentralized finance sector is moving forward, and Huma Finance's exploit serves…

2 days ago

Chainlink Expands Cross-Chain Reach As Major Protocols And Institutions Deepen Adoption 

Chainlink is continuing its mission to be the most widely integrated infrastructure in crypto, adding…

3 days ago

Sui Network Hit Again: DeepBook Exploit Adds To Growing List As Token Defies Pressure With Bullish Breakout

A vulnerability in one of the core DeFi protocols on Sui Network exposes the ecosystem…

4 days ago